A Critical Analysis On Margaret E. Roberts (2018), Censored: Distraction And Diversion Inside China’s Great Firewall
Margaret E. Robert book builds on a foundation of the basic law of economy which is the relationship between supply and demand. She argues that censorship Chinese government censorship has violated free market law. In her book, she specified three mechanisms of censorship; fear, friction, and flooding (Roberts 2018). She explained in detail how Chinese’s people reactions toward the censorship in chapter four, five and six. In this paper, I challenged Roberts idea that fear is not part of the censorship mechanism. I have two arguments; first fear is emotion it needs stimuli to appear. Second fear and curiosity are motivation behind information seeking. Fear appeared from negative experience while curiosity appeared from positive outcomes. Fear is part of information behavior, it works like a brake system (Heinstrom 2010). Through fear, the disappointment and punishment will be evaluated by individuals to decide the next move. Fear is something dynamic, as time evolve it creates sensitivity, but it does not stop the basic need of information. American astronaut Thomas P. Stafford mentioned that evolution made us the ultimate learning machine, and the ultimate learning machine needs to be oiled by curiosity (Stafford 2012). At the end of my paper, I suggested Roberts to consider using word threat as one of censorship mechanism rather than fear.
Andretta, Susie. 2012. “The Multiple-Context Relational Approach Generated by the Empirical Research.” In Ways of Experiencing Information Literacy, 89–161. Oxford UK: Chandos Publishing. https://doi.org/10.1016/b978-1-84334-680-7.50004-8.
Bradbury, Danny. 2011. “Routing around Censorship.” Network Security 2011 (5): 5–8. https://doi.org/10.1016/S1353-4858(11)70049-6.
Chen, Sally Xiaojin. 2015. “Collective Action in Digital China: A Case Study of the 2013 Southern Weekly Incident.” In China’s Contested Internet, edited by Guobin Yang, 283–304. NIAS Press.
Cheng, Yang. 2019. “The Social-Mediated Crisis Communication Research: Revisiting Dialogue between Organizations and Publics in Crises of China.” Public Relations Review, no. August 2018: 101769. https://doi.org/10.1016/j.pubrev.2019.04.003.
Collin, Harper. 2019. “Definition of Fear.” 2019. https://www.collinsdictionary.com/dictionary/english/purchasing-power.
Creemers, Rogier. 2017. “Cyber China: Upgrading Propaganda, Public Opinion Work and Social Management for the Twenty-First Century.” Journal of Contemporary China. https://doi.org/10.1080/10670564.2016.1206281.
Dictionary, Cambridge English. 2019. “Meaning of Fear in English.” 2019. http://dictionary.cambridge.org/dictionary/english/design-brief?q=Design+brief.
Fu, Tao, and Kavita Karan. 2015. “How Big Is the World You Can Explore? A Study of Chinese College Students’ Search Behavior via Search Engines.” Procedia - Social and Behavioral Sciences 174: 2743–52. https://doi.org/10.1016/j.sbspro.2015.01.961.
Han, Rongbin. 2018. Contesting Cyberspace in China: Online Expression and Authoritarian Resilience. Edited by Anne Routon and Caelyn Cobb. New York, United States of America: Columbia University Press.
Heinstrom, Jannica. 2010. From Fear to Flow. Edited by Ruth Rikowski. Oxford UK: Chandos Publishing. https://doi.org/10.1533/9781780630366.
James, Randy. 2009. “A Brief History of Chinese Internet Censorship - TIME.” Time Inc. 2009. http://content.time.com/time/world/article/0,8599,1885961,00.html.
King, Gary, Jennifer Pan, and Margaret E. Roberts. 2017. “How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, Not Engaged Argument.” American Political Science Review 111 (3): 484–501. https://doi.org/10.1017/s0003055417000144.
Lei, Yan Wen. 2018. The Contentious Public Sphere: Law, Media, and Authoritarian Rule in China. Edited by Yu Xie. Oxfordshire UK: Princeton University Press https://doi.org/10.1515/9781400887941.
Lu, Jia, Li Qi, and Xin Yu. 2019. “Political Trust in the Internet Context: A Comparative Study in 36 Countries.” Government Information Quarterly, no. June. https://doi.org/10.1016/j.giq.2019.06.003.
Maamiry, Ali Amour El. 2016. “Self-Efficacy in the Information Seeking Behaviour of State University of Zanzibar Students: A Case Study.” International Journal of Information Dissemination & Technology 6 (2): 99–102. http://search.ebscohost.com/login.aspx?direct=true&db=llf&AN=118345769&site=ehost-live.
Maner, Jon K., and Mary A. Gerend. 2007. “Motivationally Selective Risk Judgments: Do Fear and Curiosity Boost the Boons or the Banes?” Organizational Behavior and Human Decision Processes 103 (2): 256–67. https://doi.org/10.1016/j.obhdp.2006.08.002.
Merriam Webster Incorporated. 2015. “Fear | Definition of Fear by Merriam-Webster.” 2015. http://www.merriam-webster.com/dictionary/fear.
Moscovitch, David A. 2009. “What Is the Core Fear in Social Phobia? A New Model to Facilitate Individualized Case Conceptualization and Treatment.” Cognitive and Behavioral Practice 16 (2): 123–34. https://doi.org/10.1016/j.cbpra.2008.04.002.
Nobel, The. 2010. “Liu Xiaobo - Facts.” 2010. http://www.nobelprize.org/nobel_prizes/peace/laureates/2010/xiaobo-facts.html.
Pan, Jennifer. 2016. “How Market Dynamics of Domestic and Foreign Social Media Firms Shape Strategies of Internet Censorship.” Problems of Post-Communism 64 (3–4): 1–22. https://doi.org/10.1080/10758216.2016.1181525.
Parasol, Max. 2018. “The Impact of China’s 2016 Cyber Security Law on Foreign Technology Firms, and on China’s Big Data and Smart City Dreams.” Computer Law and Security Review 34 (1): 67–98. https://doi.org/10.1016/j.clsr.2017.05.022.
Qi, Aimin, Guosong Shao, and Wentong Zheng. 2018. “Assessing China’s Cybersecurity Law.” Computer Law and Security Review 34 (6): 1342–54. https://doi.org/10.1016/j.clsr.2018.08.007.
Roberts, E. Margaret. 2018. Censored: Distraction and Diversion inside China’s Great Firewall. 1st ed. Princeton New Jersey: Princeton University Press https://doi.org/10.2307/j.ctvc77b21.
Sen, A. Fulya. 2015. “Communication and Human Rights.” Procedia - Social and Behavioral Sciences 174: 2813–17. https://doi.org/10.1016/j.sbspro.2015.01.972.
Shirazi, Farid. 2012. “Free and Open Source Software versus Internet Content Filtering and Censorship: A Case Study.” Journal of Systems and Software 85 (4): 920–31. https://doi.org/10.1016/j.jss.2011.11.1007.
Stafford, Tom. 2012. “BBC - Future - Why Are We so Curious_.” 2012. http://www.bbc.com/future/story/20120618-why-are-we-so-curious.
Stockmann, Daniela. 2013. Media Commercialization and Authoritarian Rule in China. New York, United States of America: Cambridge University Press. http://www.cambridge.org/9781107018440.
Svensson, Marina. 2016. “Connectivity Engagement and Witnessing on Chinas’s Weibo.” In The Internet, Social Media and a Changing China, edited by and Guobin Yang Jacques deLisle, Avery Goldstein, 49–70. University of Pennsylvania Press.
Taylor, Robert S. 1968. “Question-Negotiation and Information Seeking in Libraries.” College and Reseach Libraries 29 No. 3: 178–94. https://doi.org/https://doi.org/10.5860/crl_29_03_178.
Tsai, Wen Hsuan. 2016. “How ‘Networked Authoritarianism’ Was Operationalized in China: Methods and Procedures of Public Opinion Control.” Journal of Contemporary China 25 (101): 731–44. https://doi.org/10.1080/10670564.2016.1160506.
Wang, Shaojung Sharon, and Junhao Hong. 2010. “Discourse behind the Forbidden Realm: Internet Surveillance and Its Implications on China’s Blogosphere.” Telematics and Informatics 27 (1): 67–78. https://doi.org/10.1016/j.tele.2009.03.004.
Xu, Jian. 2015. “Online Weiguan in Web 2.0 China: Historical Origins, Characteristics, Platforms and Consequences.” In China’s Contested Internet, edited by Guobin Yang, 257–82. NIAS Press.
Yang, Qinghua, and Yu Liu. 2014. “What’s on the Other Side of the Great Firewall? Chinese Web Users’ Motivations for Bypassing the Internet Censorship.” Computers in Human Behavior 37: 249–57. https://doi.org/10.1016/j.chb.2014.04.054.
Yu, Tai Kuei, Mei Lan Lin, and Ying Kai Liao. 2017. “Understanding Factors Influencing Information Communication Technology Adoption Behavior: The Moderators of Information Literacy and Digital Skills.” Computers in Human Behavior 71: 196–208. https://doi.org/10.1016/j.chb.2017.02.005.
Zin, Brandon. 2008. “A Tyrannical Government Is More Fierce than a Tiger 苛政猛于虎.” 2008. https://brandonzin.wordpress.com/2008/05/04/a-tyrannical-government-is-more-fierce-than-a-tiger-苛政猛于虎/.
Copyright (c) 2020 Restu Karlina Rahayu
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Atribusi-Non Commercial-Share Alike (CC BY-NC-SA).
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Every publication (printed/electronic) are open access for educational purposes, research, and library. Other than the aims mentioned above, the editorial board is not responsible for copyright violation.